united states cyber command - fbcinc.com...• cyber maneuver tool sets or exploits • signature...

16
United States Cyber Command The overall classification of this briefing is: UNCLASSIFIED Dr. Scott Dade Deputy Director, Technical Outreach and Partnerships UNCLASSIFIED 1

Upload: others

Post on 24-Aug-2020

8 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: United States Cyber Command - fbcinc.com...• Cyber maneuver tool sets or exploits • Signature diversity technology (e.g. polymorphic code) • Tool testing techniques (pen-testing)

United States Cyber Command

The overall classification of this briefing is: UNCLASSIFIED

Dr. Scott Dade Deputy Director, Technical Outreach and

Partnerships

UNCLASSIFIED

1

Page 2: United States Cyber Command - fbcinc.com...• Cyber maneuver tool sets or exploits • Signature diversity technology (e.g. polymorphic code) • Tool testing techniques (pen-testing)

What do we need?

Where do we get it?

How do we get it?

UNCLASSIFIED

UNCLASSIFIED

2

Corporate Partnerships (U)

CUSTOMER?

Page 3: United States Cyber Command - fbcinc.com...• Cyber maneuver tool sets or exploits • Signature diversity technology (e.g. polymorphic code) • Tool testing techniques (pen-testing)

Elevation to Unified Combatant Command

New Acquisition Authorities

Build Military Cyber Operations Platform

Reserves and National Guard Partnerships

UNCLASSIFIED

UNCLASSIFIED

3

What’s New? (U)

Page 4: United States Cyber Command - fbcinc.com...• Cyber maneuver tool sets or exploits • Signature diversity technology (e.g. polymorphic code) • Tool testing techniques (pen-testing)

UNCLASSIFIED

UNCLASSIFIED

4

Examples of CYBERCOM Mission Needs (U)

Foundational Tools

• Cyber maneuver tool sets or exploits • Signature diversity technology (e.g. polymorphic code) • Tool testing techniques (pen-testing) • Cyber Autonomy to advance speed and scale

Split-Based OPS Technology

• Tools for integration into deployable kits/systems • Rapidly deployable sensors that include:

− Innovative remote C2 technology − Undetectable/low signature network presence

Analytic Tools • Behavioral Analytics, Machine Learning, Artificial Intelligence & Cognitive

Intuition to discover malicious or anomalous activity

Unconventional Access Tools • Tools to gain cyberspace operational access

Page 5: United States Cyber Command - fbcinc.com...• Cyber maneuver tool sets or exploits • Signature diversity technology (e.g. polymorphic code) • Tool testing techniques (pen-testing)

Mission Critical Cyber Capabilities

CORPORATE PARTNERSHIPS

Engagement Strategy

Page 6: United States Cyber Command - fbcinc.com...• Cyber maneuver tool sets or exploits • Signature diversity technology (e.g. polymorphic code) • Tool testing techniques (pen-testing)

U.S. Cyber Command

Operate in and Defend DoD Information

Networks (DoDIN)

Defend the Nation

Against Strategic Cyber Attack

Combatant Command

Support

Cyber Combat Mission Forces

Cyber National Mission Forces

DISA and “Services” Cyber Protection

Forces

USCYBERCOM plans, coordinates, integrates, synchronizes and conducts activities to: direct the operations and defense of specified Department of Defense information networks and; prepare to, and when directed, conduct full spectrum military cyberspace operations

6

OFFENSIVE CYBER OPERATIONS

DoDIN OPERATIONS

DEFENSIVE CYBER OPERATIONS

UNCLASSIFIED

UNCLASSIFIED

(U)

Page 7: United States Cyber Command - fbcinc.com...• Cyber maneuver tool sets or exploits • Signature diversity technology (e.g. polymorphic code) • Tool testing techniques (pen-testing)
Page 8: United States Cyber Command - fbcinc.com...• Cyber maneuver tool sets or exploits • Signature diversity technology (e.g. polymorphic code) • Tool testing techniques (pen-testing)

UNCLASSIFIED

UNCLASSIFIED

8

Dreamport

Page 9: United States Cyber Command - fbcinc.com...• Cyber maneuver tool sets or exploits • Signature diversity technology (e.g. polymorphic code) • Tool testing techniques (pen-testing)

• State-of-the-art Cyber Prototyping

and Collaboration

• Managed by MISI: Maryland

Innovation and Security Institute

• Testing, Integration & Fabrication

Labs

• Cyber Ranges and Test Networks

• Ad-hoc Demonstration Center

9

Dreamport?

Page 10: United States Cyber Command - fbcinc.com...• Cyber maneuver tool sets or exploits • Signature diversity technology (e.g. polymorphic code) • Tool testing techniques (pen-testing)

• Hub of Collaboration and innovation

• Technology sharing/development to

support technology transitions.

• Identification of promising tech to

fulfill USCYBERCOM mission needs.

• Development of an ecosystem of

collaborative problem-solving partners.

• Host challenge events that inspire

technically innovative problem solving.

• Rapid acquisition

10

Dreamport Objectives

Page 11: United States Cyber Command - fbcinc.com...• Cyber maneuver tool sets or exploits • Signature diversity technology (e.g. polymorphic code) • Tool testing techniques (pen-testing)

11

OFFENSE WINNER DEFENSE WINNER HONORABLE MENTION

(DEFENSE)

XETRON

Rapid Prototyping Events (RPEs)

Page 12: United States Cyber Command - fbcinc.com...• Cyber maneuver tool sets or exploits • Signature diversity technology (e.g. polymorphic code) • Tool testing techniques (pen-testing)

Reserves and National Guard Partnerships

UNCLASSIFIED

UNCLASSIFIED

02

Page 13: United States Cyber Command - fbcinc.com...• Cyber maneuver tool sets or exploits • Signature diversity technology (e.g. polymorphic code) • Tool testing techniques (pen-testing)

UNCLASSIFIED

UNCLASSIFIED

13

• Joint Capabilities Development

• Cyber Capability Solutions and Analysis

• Technologies, Capabilities and

Knowledge Sharing

Reserves and National Guard Partnerships

Page 14: United States Cyber Command - fbcinc.com...• Cyber maneuver tool sets or exploits • Signature diversity technology (e.g. polymorphic code) • Tool testing techniques (pen-testing)

UNCLASSIFIED

UNCLASSIFIED

14

What do we need?

Page 15: United States Cyber Command - fbcinc.com...• Cyber maneuver tool sets or exploits • Signature diversity technology (e.g. polymorphic code) • Tool testing techniques (pen-testing)

UNCLASSIFIED 15

UNCLASSIFIED

[email protected]

www.dreamport.tech

Page 16: United States Cyber Command - fbcinc.com...• Cyber maneuver tool sets or exploits • Signature diversity technology (e.g. polymorphic code) • Tool testing techniques (pen-testing)

Discussion